Without knowing what was being hosted, the only surefire way would be pulling a complete disk image with cat or dd.
That’s not surefire, unless you’re doing it offline. If the data is in motion (like a database that’s being updated), you will end up with an inconsistent or corrupt backup.
Surefire in that case would be something like an lvm snapshot.
If you wanted to stay on a similar system, RHEL 9 would be a good option or one of its “as similar as possible” like AlmaLinux.
No love for Rocky?
Also Oracle Linux is still free, and fully compatible with RHEL.
Read the post. The user obviously didn’t even know that Mullvad uses DNS over TLS and that the other providers used regular DNS, nor did he know how to properly troubleshoot a DNS issue, which is a skill you should have on any OS if you’re going to mess about with DNS settings.
I have had so many instances of having to spend hours upon hours upon hours just do figure out how to do some basic shit on Linux that I can do on every operating system within a matter of 5 minutes
Whether DNSOverTls (dns-over-tls) is enabled for the connection. DNSOverTls is a technology which uses TLS to encrypt dns traffic. The permitted values are: “yes” (2) use DNSOverTls and disabled fallback, “opportunistic” (1) use DNSOverTls but allow fallback to unencrypted resolution, “no” (0) don’t ever use DNSOverTls. If unspecified “default” depends on the plugin used. Systemd-resolved uses global setting. This feature requires a plugin which supports DNSOverTls. Otherwise, the setting has no effect. One such plugin is dns-systemd-resolved.
I don’t use NetworkManager, I’ve never even used Tumbleweed and I found the answer in all of 10 minutes. Of course that doesn’t help if you’re so clueless that you didn’t even know that you were using DNS-over-TLS, or that DoT is a very recent development that differs significantly from regular DNS and that it requires a DNS resolver that supports it.
when every other operating system does?
Like Windows 10? (Hint: it doesn’t)
You use Arch. Mr skillful
Who cares what I use. When I’m messing with something I don’t understand, I at least read the documentation first instead of complaining on the internet and calling the whole community toxic and, I quote, “Butthurt Linux gobblers” when you get the slightest bit of pushback.
It’s not just about trusting Microsoft, but about control over the technology. Users will never have real control over AI technology, it’s too valuable and the inner workings are anxiously being kept under wraps by the big techbro companies. It also runs on their computers for the most part, so of course we can’t trust what’s being done with it, regardless of whether Microsoft has been a good boy or a bad boy recently.
Use Xorg with the proprietary driver instead of Wayland for the time being. Much less issues. You can always switch to Wayland later when either Nvidia support matures, or when your next computer has an AMD GPU.
Or get a cheap ass AMD GPU, like an RX6400, plop it in as a second GPU and run on that in Linux. Perfectly serviceable for plain desktop stuff.
Or run on integrated graphics, if you have it. Again, perfectly serviceable for plain desktop stuff.
Yeah but you said you wanted a dual-boot machine for your next computer, with Windows only for gaming. What I meant is: why not get a head start and make your current computer that dual-boot machine?
I don’t think the word Reich, without further context, is by itself suspect in German. It just a generic word for realm, and is not bound to any specific political system. Even their parliament building is still called the Reichstag. In German it’s also common to refer to modern day monarchies as Königreich. Even the Belgian constitution, where German is one of the three official languages, refers to the country as das Königreich. And there are even two whole countries that have it in their German name: Österreich and Frankreich.
Where it becomes suspect is when inexplicably the German word is used in the English language in a certain context by certain politicians with certain ideas, as it is here.
There was a short period of time when enlightenment was the default window manager for Gnome, later to be replaced by Sawfish. It was a hideous experience by the way.
Early Gnome was weird. The Gnome File Manager was also originally based on the terminal program Midnight Commander.
in early 2000’s, internet access was extremely fucking expensive, so most software was peer-to-peer shared, not even by torrent, but on CD’s or floppys, or local neighborhood ad-hoc and internal ISP networks
Uh no. I was there. In 1995 or 1996, I may have still used a shareware CD-ROM, or some less-legal compilation CD-ROM, but in the 2000s the most common way to install software by far was to download it over the internet.
And there was no access control whatsoever. A literal spyware with full access to your system, that only puts a purple fucking gorilla on your screen, that runs around and does absolutely fucking nothing? Sign me the fuck in. If your virus did something even something remotely useful, like show weather and currency rates, then you could rest assured that it would infect every single computer in the country.
I think the point of the post is that back then people were warned against installing bonzi buddy and such, and we were told to install software only from trustworthy sources. Spyware software rightfully flagged such software as malware too. Nowadays, there are appstores full of banal apps which harvest much more personal information about you than bonzi buddy ever did and we’re not batting an eye about it, and even though we have “Access control” we just happily click accept when our calculator wants to read our emails, and we’ve accepted it as a normal way of doing things.
It’s like those websites and applications that ask you:
<span style="color:#323232;">Hey do you want to turn on this bullshit feature?
</span><span style="color:#323232;">
</span><span style="color:#323232;">[Yes] [Ask me again later]
</span>
Even if you have encrypted your traffic with a VPN (or the Tor Network), advanced traffic analysis is a growing threat against your privacy. Therefore, we now introduce DAITA....
True that. Hadn’t thought of that as it’s not my typical VPN use case.
I’m not sure what a VPN provider could do about that though, they don’t control the operating system’s networking stack. If the user or an outside process that the user decides to trust (i.e. a dhcp server) adds its own network routes, the OS will follow it and route traffic outside of the tunnel.
The defenses I see against it are:
Run the VPN and everything that needs to go through the VPN in a virtualized, non-bridged environment so it’s unaffected by the routing table.
Put a NAT-ing device in between your computer and the network you want to use
Modify the DHCP client so that option 121 is rejected
Edit: thinking about it some more, on Linux at least the VPN client could add some iptables rules that block traffic going through any other interface than the tunnel device (i.e. if it’s not through tun0 or wg0, drop it). Network routes can’t bypass iptables rules, so that should work. It will have the side effect that the VPN connection will appear not to work if someone is using the option 121 trick though, but at least you would know something funny was happening.
Oh and don’t forget to take backups of your /home. Thats good practice for every desktop environment.
The config files of the major desktop environments have become a mess though. Plasma absolutely shits files all over ~/.config and /.local/share where they sit mingled together with the config files of all your other applications and most of it is thoroughly undocumented. I’ve been in the situation where I wanted to restore a previous state of my Plasma desktop from my backups or just start with a clean default desktop and there is just no straightforward way to do that, short of nuking all your configurations.
Doing a quick find query in my current home directory, there are 57 directories and 79 config files that have either plasma or kde in the name, and that doesn’t even include all the /.config/* files belonging to plasma or kde components that don’t have it in their name explicitly (e.g. dolphinrc, katerc, kwinrc, powerdevilrc, bluedevilglobalrc , …)
It was much simpler in the old days when you just had something like a ~/.fvwmrc file that was easy to backup and restore, even early kde used to store everything together in a ~/.kde directory.
apt purge nano is one of the first things I do on a new Debian installation. Much easier to remember than having to use update-alternatives, select-editor and the $EDITOR variable to convince the likes of vigr,vipw, visudo,crontab -e,… that I really want to use vim as my primary editor.
Not really, because you’re now going to make it do more, i.e. incorporate the functionality of sudo and expose it to user input. So unless you can prove that the newly written code is somehow inherently more secure than sudo’s existing code, the attack surface is exactly the same.
I wonder if it’s possible to run their remapping program in a Windows virtual machine.
That should work if you can pass through the entire USB host device to the VM.
I do this with my QK80, which also has Windows only software. I have a KVM virtual machine with Windows, and when I want to configure the QK80, I use the “pass through USB host device” option to give it direct access to the keyboard, and run the software in the VM. It works fine.
If you do this, you temporarily need to connect a second keyboard though because as soon as you pass through the keyboard to the VM it becomes inaccessible for the host OS.
CentOS 6.3 - Best backup / restore solution?
Hello everyone!...
(SOLVED) I'm Going Insane. Why Does Mullvad DNS Not Work Underneath My Linux Machine When Every Other DNS Does?
I have wasted the last 2.5 hours trying to see where I went wrong with my configuration and I just can’t....
New Windows AI feature records everything you’ve done on your PC (arstechnica.com)
Trump's social media account shares a campaign video with a headline about a 'unified Reich' (apnews.com)
Trump has a very long history of using this kind of thing to say what the campaign is thinking about doing....
The reality of modern tech (files.catbox.moe)
Not a Coincidence (lemm.ee)
First meme (hopefully good) (lemm.ee)
You might want to upgrade it with a graphics card tho, because you're limited to 75hz above 1080p, but it isn't worth it that much. (lemmy.world)
I just can't even. (lemmy.world)
jk, we still love you Gitea ..for now (lemy.lol)
We all know who’s the real steward of free software and federation...
Mullvad VPN: Introducing Defense against AI-guided Traffic Analysis (DAITA) (mullvad.net)
Even if you have encrypted your traffic with a VPN (or the Tor Network), advanced traffic analysis is a growing threat against your privacy. Therefore, we now introduce DAITA....
KDE Plasma needs stability (www.youtube.com)
NATO sounds alarm over 'hostile' Russian activity across Europe (www.euronews.com)
The US-led alliance said it was concerned by Moscow’s “hybrid activity” in Czechia, Estonia, Germany, Latvia, Lithuania, Poland and the UK....
GNU nano 8.0 Released with New Options and Various Improvements (9to5linux.com)
Systemd wants to expand to include a sudo replacement (outpost.fosspost.org)
8bitdo made a Commodore 64 variant of their keyboard (shop.8bitdo.com)
The 8bitdo keyboard has been pretty well-received as a ~$100 wireless keyboard with ABS keycaps. I love the way this C64 color scheme looks....